Cyber Security Questions
Cyber Security Questions
i. IDS and IPS are both parts of the network infrastructure. IDS/IPS compare
network packets to a cyberthreat database containing known signatures of
cyberattacks-and flag any matching packets.
ii. The main difference is that IDS is a monitoring system and IPS is a control
system
iii. IDS doesn’t alter the network packets in any way, whereas IPS prevents the
packet from delivery based on the contents of the packet, much like how a
firewall prevents traffic by IP address
2. Explain risk, vulnerability, and threat
a. A threat exploits a vulnerability and can damage or destroy an asset.
b. Vulnerability refers to a weakness in your hardware, software, or procedures. (In
other words, it’s a way hackers could easily find their way into your system.)
c. Risk refers to the potential for lost, damaged, or destroyed assets
3. What’s the difference between Asymmetric and symmetric encryption and which one is
better?
a. Symmetric encryption uses the same key for both encryption and decryption, while
Asymmetric encryption uses different keys for encryption and decryption.
Symmetric is usually much faster but the key needs to be transferred over an
encrypted channel. Asymmetric is more secure but slow. Hence, a hybrid approach
should be preferred. Setting up a channel using asymmetric encryption and then
sending the data using a symmetric process.
4. What is XSS and how do you mitigate it?
a. Cross Site Scripting is a JavaScript vulnerability in web applications. The easiest way
to explain this is a case when a user enters a script in the client-side input fields and
that input gets processed w/out getting validated. This leads to untrusted data
getting saved and executed on the client-side. Countermeasures of XSS are input
validation, implementing a CSP (Content security policy), etc…
5. What is the difference between encryption and hashing?
a. Encryptions is reversible whereas hashing is irreversible. Hashing can be cracked
using rainbow tables and collision attacks but is not reversible.
b. Encryption ensures confidentiality whereas hashing ensures integrity.
6. What is CSRF?
a. Cross-Site Request Forgery is a web application vulnerability in which the server
does not check whether the request came from a trusted client or not. This request
is just processed directly. It can be further followed by the ways to detect this,
examples, and countermeasures.
7. What is the difference between XSS & CSRF
a. Since it doesn’t require any user interaction, XSS is believed to be more dangerous,
CSRF is restricted to the actions victims can perform. XSS, on the other hand, works
on the execution of malicious scripts enlarging the scope of actions the attacker can
perform.
b. XSS requires only a vulnerability, while CSRF requires a user to access the malicious
page or click a link.
c. CSRF works only one way-it can only send HTTP requests but cannot view the
response. XSS can send and receive HTTP requests and responses in order to extract
the required data.
8. Is XSS Client-side attack or Server-side attack?
a. Client-side attack
9. What is IOC
a. Indicator of compromise in computer forensics is an artifact observed on a network
or in an operating system that, w/ high confidence, indicates a computer intrusion.
Ex hash, IP, domain, url, user-agent, etc…
10. Anti-virus vs EDR
a. EDR includes:
i. Real-time monitoring and detection of threats-including those that may not
be easily recognized or defined by standard antivirus. Also, EDR is behavior
based, so it can detect unknown threats based on behavior that isn’t normal
ii. Data collection and analysis determines threat patterns and alerts
organizations to threats
iii. Forensic capabilities can assist in determining what has happened during a
security event
b. Antivirus:
i. Antivirus is signature based, so it only recognizes threats that are known
ii. AV can include scheduled or regular scanning of protected devices to detect
known threats
iii. Assists in removal of more basic viruses (worms, trojans, malware, adware,
spyware, etc…)
iv. Warnings about possibly malicious sites
c. Do I need both?
i. No. EDR is sufficient
1. When looking at events/logs in Splunk, what is the highest-level category that logs can be
grouped into?
a. Sourcetype
2. Matching
a. Suricata-Suricata NIDS
b. Xmlwineventlogs-Sysmon logs
c. Fortigate_UTM-the Fortigate Unified Threat Management firewall
d. Wineventlogs-standard Windows event logging
3. We are trying to get the number of destination IP addresses that a system has connected to.
If the source IP is 192.168.1.100 and the destination IP field name is ‘dst_ip’, what search
query would we use to find the total number of destination IPs and how many times a
destination IP appears in the logs?
a. Index=”botsc1” src_ip=192.168.1.100|stats count by dst_ip